Summarize with:

Share
CVE-2026-35616 is the second serious FortiClient EMS story in less than two weeks, and that alone should change how defenders prioritize it. Fortinet issued out-of-band hotfixes for an improper access control bug in FortiClient Endpoint Management Server (EMS) 7.4.5 and 7.4.6. Public reporting and researcher statements say the flaw has already been exploited, while Fortinet has pushed customers toward emergency fixes and the upcoming 7.4.7 release.
The important lesson is not just that another high-severity vulnerability hit FortiClient EMS. It is that an unauthenticated API authentication and authorization bypass in an exposed endpoint management tier creates immediate management-plane risk. When attackers can reach the server before login, the problem is no longer just patch hygiene. It becomes a potential incident response event.
FortiClient EMS is not a low-value application. It is a centralized control point used to enroll endpoints, distribute security policy, manage certificates, and maintain visibility across managed devices. That makes it part of the high-trust administrative layer of an enterprise attack surface.
According to Fortinet and third-party reporting, CVE-2026-35616 is an improper access control issue that can allow an unauthenticated attacker to bypass API authentication and authorization controls with crafted requests. Public summaries describe the likely impact as unauthorized code or command execution on the vulnerable host.
That combination matters for two reasons:
In practice, a compromise at that layer can quickly move beyond one server and into wider trust, policy, and credential risk.
Fortinet’s advisory says the issue affects FortiClient EMS 7.4.5 through 7.4.6 and that the 7.2 branch is not affected. The company says the flaw will also be fixed in 7.4.7 and has released hotfix guidance for affected builds.
Public reporting from BleepingComputer and Help Net Security says researchers at Defused observed exploitation activity and framed the weakness as a pre-authentication API access bypass. runZero also highlighted that more than 2,000 internet-exposed FortiClient EMS instances were visible online, which gives defenders a useful reminder: even if only a subset is actually vulnerable, the product is discoverable at scale.
One detail worth noting is that the public messaging has not been perfectly aligned. Third-party reporting describes active exploitation, while the scraped Fortinet advisory view is less explicit in the summary text. Defenders should not wait for perfect wording convergence before acting. Weekend hotfixes for a critical unauthenticated management-plane bug are enough reason to move fast.
A bug like CVE-2026-35616 is more serious than an ordinary web application flaw because of what FortiClient EMS controls.
If attackers gain access to the EMS layer, the downstream risk can include:
That is why this should be treated as management-plane exposure. Security tooling can become a force multiplier for attackers when it is both internet-reachable and highly trusted.
CVE-2026-35616 is a reminder that endpoint management infrastructure deserves the same urgency defenders already apply to edge appliances and identity systems. A critical unauthenticated API bypass on a product that governs endpoint trust should move straight into the highest operational queue.
For FortiClient EMS users, the decision path is straightforward: patch 7.4.5 and 7.4.6 immediately, remove unnecessary exposure, and investigate exposed servers as though they may already need containment. When the vulnerable system is the one managing your security agents, delaying the response is the real risk multiplier.
CVE-2026-35616 is a critical improper access control vulnerability in Fortinet FortiClient EMS. Public reporting says it enables a pre-authentication API authentication and authorization bypass that can lead to unauthorized code or command execution.
Fortinet says FortiClient EMS 7.4.5 through 7.4.6 are affected. The 7.2 branch is not affected, and 7.4.7 is expected to include the fix.
Because FortiClient EMS is a high-trust management platform for endpoints. If attackers compromise that server, the impact can extend into policy control, credentials, and downstream security operations.
Patch affected servers immediately, prioritize any internet-exposed EMS instances, and review those systems for signs of suspicious API activity or unauthorized administrative actions.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
vulnerabilityCVE-2026-20182 makes Cisco SD-WAN controllers an urgent KEV priority CVE-2026-20182 is not landing as a routine patch bulletin. Cisco says the flaw is already b...
vulnerabilityExim BDAT flaw makes mail servers urgent RCE patch targets CVE-2026-45185 is the kind of bug that forces defenders to remember an old lesson: email infrastructu...
vulnerabilityDirty Frag Linux kernel zero-day gives local users a fast path to root Dirty Frag is the kind of Linux bug defenders worry about because it turns a limited foot...